General

  • Target

    SCAN-HSBC-PAYMENT-ADVICE.xls

  • Size

    751KB

  • Sample

    240723-hbsr1ssgnp

  • MD5

    32eb79369e1e7e135906f146b9d35457

  • SHA1

    cf00749dc8097014fa6f94dba1b400e600cd92d8

  • SHA256

    9634a4f19306cf8e57396c40e99612888f2663cfe261e3640b836ad488cfe95b

  • SHA512

    808b364e5688dc85565411933fb03dbed3b21d0043776585e133f4ad817079fee36c02f1b530fbc0b260e4970ed3b13f6d5deacf39b9cd7a85420dec50c14904

  • SSDEEP

    12288:0qFzu4LSZU2QdSZKHuntvZctbyyWgFfX202BToNcq7nqDljjTvyd8NPi9zS+i:Nzu4LLxdSZw0vZEbciX20KTZ++ljjTDD

Malware Config

Extracted

Family

lokibot

C2

http://overclockingmachines.info/bally/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Targets

    • Target

      SCAN-HSBC-PAYMENT-ADVICE.xls

    • Size

      751KB

    • MD5

      32eb79369e1e7e135906f146b9d35457

    • SHA1

      cf00749dc8097014fa6f94dba1b400e600cd92d8

    • SHA256

      9634a4f19306cf8e57396c40e99612888f2663cfe261e3640b836ad488cfe95b

    • SHA512

      808b364e5688dc85565411933fb03dbed3b21d0043776585e133f4ad817079fee36c02f1b530fbc0b260e4970ed3b13f6d5deacf39b9cd7a85420dec50c14904

    • SSDEEP

      12288:0qFzu4LSZU2QdSZKHuntvZctbyyWgFfX202BToNcq7nqDljjTvyd8NPi9zS+i:Nzu4LLxdSZw0vZEbciX20KTZ++ljjTDD

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Abuses OpenXML format to download file from external location

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks